Deal: Galaxy S10e from $10/month!
Reviews

Beats Powerbeats Pro review: Beat it, AirPods

Lily Katz May 26, 2019 146 shares
Opinions

I’m tired of giving up battery life for a reasonably sized phone

Jimmy Westenberg May 25, 2019 761 shares
Features

Honor 20 Pro review: Everyday luxury

Bogdan Petrovan May 21, 2019 452 shares
News

Xiaomi Redmi K20: All the rumors in one place (Update: Headphone jack)

C. Scott Brown 34 minutes ago 194 shares
43 articles
 

Google hopes Adiantum will bring encryption to budget smartphones

Adiantum could solve the issue of low-end hardware not supporting processor-heavy encryption.
C. Scott BrownFebruary 7, 201988 shares
 

Encrypt and secure your files with Kruptos 2 Pro — 67% off today

Kruptos 2 is the easy-to-use, military-grade encryption software that keeps your files secure across your devices.
AA PicksJanuary 17, 2019646 shares
 

How easy is it to capture data on public free Wi-Fi? – Gary explains

You should always exercise caution when connecting to open Wi-Fi hotspots. But here is the question, just how easy is it to capture data on public free Wi-Fi?
Gary SimsFebruary 14, 20181085 shares
 

How to encrypt your Android device

Your Android device is a pocket-size container of important information that you don't want to fall into the wrong hands. It is crucial to keep your Android data safe. In this post, ...
Robert TriggsAugust 3, 2017987 shares
 

Google shatters SHA-1, but don’t worry: the Internet is still working

Google has shown that it can create two files with the same SHA-1 hashes, bad news for SHA-1 itself, but don't worry the Internet is still working.
Gary SimsFebruary 24, 2017588 shares
 

Following Trump’s win, new users of encrypted email services double

Following the announcement of the election result, the world's largest encrypted email service provider has seen its new user sign-ups double.
Kris CarlonNovember 12, 2016717 shares
 

Great, now Google’s AI is coming up with its own encryption methods

Google Brain researchers have confirmed that AI neural networks have successfully created an encryption method even another AI cannot decrypt.
Kris CarlonOctober 28, 20161078 shares
 

Express VPN review

It seems to me that a week can't go by without there being some revelation or other connected with privacy. The solution is to use a VPN! Here is my full review of Express VPN.
Gary SimsOctober 21, 2016834 shares
 

How does public key cryptography work? – Gary explains

How keys are distributed is vital to any encryption system. Find out how to do it with the Diffie–Hellman key exchange and using public-key cryptography.
Gary SimsOctober 4, 2016136 shares
 

How does encryption work? – Gary explains

You probably use some form of encryption almost every day, and you probably don't even think about it. But what is it and how does it work?
Gary SimsSeptember 13, 201610 shares
Load More
End of the line!